{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:28:00Z","timestamp":1729650480521,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/iccat.2013.6521970","type":"proceedings-article","created":{"date-parts":[[2013,5,31]],"date-time":"2013-05-31T16:44:06Z","timestamp":1370018646000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Biometrics acceptance in Arab culture: An exploratory study"],"prefix":"10.1109","author":[{"given":"Abdullah Santos","family":"Rashed","sequence":"first","affiliation":[]},{"given":"Al-Eryani","family":"Henrique","sequence":"additional","affiliation":[]},{"family":"Arwa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.04.041"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(07)70122-4"},{"journal-title":"UNISYS Security Index-Global Summary","year":"2008","key":"16"},{"key":"13","article-title":"A review of vulnerabilities in identity management using biometrics, future networks, 2010","author":"sabena","year":"2010","journal-title":"ICFN '10 Second International Conference on"},{"key":"14","article-title":"A proposed study and analysis of user perceptions of biometric acceptance","author":"schmidt","year":"2008","journal-title":"Proceedings of the National Decision Sciences Institute (DSI) Conference"},{"journal-title":"User Acceptance OTM Machine In the Arab Culture the International Journal on Electronic Security and Digital Forensics","year":"2010","author":"rashed","key":"11"},{"key":"12","article-title":"Validating TAM with odour interface in ATM machines","volume":"10","author":"rashed","year":"2010","journal-title":"Global Journal of Computer Science and Technology GJCST"},{"year":"0","key":"3"},{"key":"2","first-page":"26","volume":"13 e","author":"alhussain","year":"2009","journal-title":"Towards User Acceptance of Biometric Technology in e Government A Survey Study in the Kingdom of Saudi Arabia"},{"key":"1","article-title":"The feasibility of biometrics authentication in e-commerce: User acceptance","author":"al-harby","year":"2001","journal-title":"IADIS International Conference"},{"journal-title":"OTM Machine Acceptance In the Arab Culture ICGS3 6th International Conference for on Global Security Safety and Sustainability","year":"2010","author":"rashed","key":"10"},{"key":"7","article-title":"Perception and acceptance of fingerprint biometric technology, ACM international conference proceeding series","volume":"229","author":"heckle","year":"1996","journal-title":"Proceedings of the 3rd symposium on Usable privacy and security"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/49.223865"},{"key":"5","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1145\/642611.642639","author":"conventry","year":"2003","journal-title":"Usability and Biometric Verification at the ATM Interface Conference on Human Factors in Computing Systems Archive Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"},{"journal-title":"Biometrics Acceptance-Perceptions of Use Of Biometrics ACIS 2004 Proceedings","year":"2004","author":"chau","key":"4"},{"journal-title":"Odour User Interface for Authentication Possibility and Acceptance Case Study the International MultiConference of Engineers and Computer Scientists 2010 (IMECS2010)","year":"2010","author":"rashed","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(09)70077-3"}],"event":{"name":"2013 International Conference on Computer Applications Technology (ICCAT 2013)","start":{"date-parts":[[2013,1,20]]},"location":"Sousse","end":{"date-parts":[[2013,1,22]]}},"container-title":["2013 International Conference on Computer Applications Technology (ICCAT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6495585\/6521952\/06521970.pdf?arnumber=6521970","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,23]],"date-time":"2022-02-23T14:22:10Z","timestamp":1645626130000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6521970\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iccat.2013.6521970","relation":{},"subject":[],"published":{"date-parts":[[2013,1]]}}}